Professional Documents
Culture Documents
Seminar Topics For CS Students
Seminar Topics For CS Students
voice morphing
The method of transforming the source speaker�s speech to that of the target
Using the linear transformations estimated from time-aligned parallel training data, it
transforms the spectral envelope of the potential speaker in tone with the target speaker.
As the image morphing is analogous in nature, i.e. the source face smoothly changing its
shape and texture to the target face, speech morphing also should smoothly change the
source voice into another, keeping the shared characteristics of the starting and ending
signals. The pitch and the envelope information are two factors that coincide in a speech
signal, which needs to be separated. The method of cepstral analysis is usually employed
2. Stealth virus
This virus hides from the operating system when the system checks the location
where the virus resides, by forging results that would be anticipated from an uninfected
system. The different kinds of virus, one of them known as fast-infector virus infects not
only programs that are executed but also those that are merely accessed therefore running
antiviral scanning software on a computer infected by such a virus can infect every
program on the computer. Another kind called the slow-infector virus infects files only
while they are modified, so that the modification appears legitimate to checksumming
software. Yet another kind called the sparse-infector virus infects only on certain
occasions—for example, it may infect every tenth program executed. This strategy makes it
cryptography using the Java programming language. It forms part of the Java security API,
has lot of advantages when compared with the latter. This digital version of real money,
which is of one time use, can always protects the secrecy and thus prevents it from
counterfeiting. More details can be got from once and that is hard to forge.
as the collinear holography, would soon gain upper hand over the existing technologies
like the blue-ray and HD DVD optical disc systems with respect to its storage capacity.
Consisting of a blue-green laser and a red laser collimated in a single beam, the blue-
green laser reads data encoded as laser interference fringes from a holographic layer near
the top of the disc while the red laser is used as the reference beam and to read servo
6. wifiber
A new wireless technology could beat fiber optics for speed in some applications.
Atop each of the Trump towers in New York City, there s a new type of wireless
transmitter and receiver that can send and receive data at rates of more than one gigabit
per second -- fast enough to stream 90 minutes of video from one tower to the next, more
than one mile apart, in less than six seconds. By comparison, the same video sent over a
to fiber optics, than to Wi-Fi or Wi-Max, says John Krzywicki, the company s vice
president of marketing. And it s best suited for highly specific data delivery situations.
This kind of point-to-point wireless technology could be used in situations where
digging fiber-optic trenches would disrupt an environment, their cost be prohibitive, or
the installation process take too long, as in extending communications networks in cities,
Wireless also provide such services. What makes GigaBeam s technology different is that it
exploits a different part of the electromagnetic spectrum. Their systems use a region of
the spectrum near visible light, at terahertz frequencies. Because of this, weather
conditions in which visibility is limited, such as fog or light rain, can hamper data
transmission.
GigaBeam, however, transmits at 71-76, 81-86, and 92-95 gigahertz frequencies, where
these conditions generally do not cause problems. Additionally, by using this region of
the spectrum, GigaBeam can outpace traditional wireless data delivery used for most
wireless networks.
Because so many devices, from Wi-Fi base stations to baby monitors, use the frequencies
of 2.4 and 5 gigahertz, those spectrum bands are crowded, and therefore require complex
algorithms to sort and route traffic -- both data-consuming endeavors, says Jonathan
Wells, GigaBeam s director of product development. With less traffic in the region between
70 to 95 gigahertz, GigaBeam can spend less time routing data, and more time delivering
it. And because of the directional nature of the beam, problems of interference, which
plague more spread-out signals at the traditional frequencies, are not likely; because the
tight beams of data will rarely, if ever, cross each other s paths, data transmission can
advance, it does not outperform current fiber-optic lines, which can still send data much
faster.
Even with its advances, though, Gigabeam faces the same problem as other point-to-
point technologies: creating a network with an unbroken sight line. Still, it could offer
some businesses an alternative to fiber optics. Currently, a GigaBeam link, which consists
of a set of transmitting and receiving radios, costs around $30,000. But Krzywicki says
that improving technology is driving down costs. In addition to outfitting the Trump
towers, the company has deployed a link on the campuses of Dartmouth College and Boston
University, and two links for San Francisco s Public Utility Commission.
7. C3D
C3D has had a breakthrough in the 3-D arena with their FMD technology, which
allows multiple layers of data to be printed onto the surface of a CD-sized 12 cm disk.
What sets FMD apart is the sheer number of layers that are made possible.
C3D�s fluorescent technology could scale up to an impressive 1.4 terabytes of data storage
when applied on a single sided 12 cm disk with 100 layers. With S3D�s new FMD technologies,
thought processes of human beings. Second, it deals with representing those processes via
a human being, would be called intelligent. It makes machines smarter and more useful, is
less expensive than natural intelligence. Natural Language Processing (NLP) refers to
like English. The main objective of a NLP program is to understand input and initiate
action.
The input words are scanned and matched against internally stored known
words. Identification of a keyword causes some action to be taken. In this way, one can
communicate with computer in one’s language. One of the main benefits of speech
8. AKA
AKA stands for the Authentication and Key Agreement security protocol. It is a
mechanism which performs authentication and session key distribution in Universal Mobile
that uses symmetric cryptography. AKA is typically run in a UMTS IM Services Identity
Module (ISIM), which resides on a smart card like device that also provides tamper
the Diffie-Hellman exponential key exchange, in which two people jointly exponentiate a
generator with random numbers, in such a way that an eavesdropper has no way of guessing
what the key is.However, exponential key exchange in and of itself does not specify any
prior agreement or subsequent authentication between the participants. It has thus been
methods generally mathematically bind the agreed key to other agreed-upon data, such as:
Public/private key pairs , Shared secret keys , Passwords
9. Blue Eyes
Definition
Imagine yourself in a world where humans interact with computers. You are sitting
in front of your personal computer that can listen, talk, or even scream aloud. It has the
ability to gather information about you and interact with you through special techniques
like facial recognition, speech recognition, etc. It can even understand your emotions at
the touch of the mouse. It verifies your identity, feels your presents, and starts
interacting with you .You ask the computer to dial to your friend at his office. It
realizes the urgency of the situation through the mouse, dials your friend at his office,
Human cognition depends primarily on the ability to perceive, interpret, and integrate
computers would enable computers to work together with human beings as intimate partners.
Researchers are attempting to add more capabilities to computers that will allow them to
interact like humans, recognize human presents, talk, listen, or even guess their
feelings.
The BLUE EYES technology aims at creating computational machines that have perceptual and
sensory ability like those of human beings. It uses non-obtrusige sensing method,
employing most modern video cameras and microphones to identifies the users actions
through the use of imparted sensory abilities . The machine can understand what a user
wants, where he is looking at, and even realize his physical or emotional states.
The basic idea behind this technology is to give the computer the human power. We all have
some perceptual abilities. That is we can understand each others feelings. For example we
can understand ones emotional state by analyzing his facial expression. If we add these
perceptual abilities of human to computers would enable computers to work together with
human beings as intimate partners. The "BLUE EYES" technology aims at creating
computational machines that have perceptual and sensory ability like those of human
beings.
Theory
Based on Paul Ekman's facial expression work, we see a correlation between a person's
emotional state and a person's physiological measurements. Selected works from Ekman and
others on measuring facial behaviors describe Ekman's Facial Action Coding System (Ekman
and Rosenberg, 1997). One of his experiments involved participants attached to devices to
record certain measurements including pulse, galvanic skin response (GSR), temperature,
somatic movement and blood pressure. He then recorded the measurements as the participants
were instructed to mimic facial expressions which corresponded to the six basic emotions.
He defined the six basic emotions as anger, fear, sadness, disgust, joy and surprise. From
this work, Dryer (1993) determined how physiological measures could be used to distinguish
Six participants were trained to exhibit the facial expressions of the six basic emotions.
While each participant exhibited these expressions, the physiological changes associated
with affect were assessed. The measures taken were GSR, heart rate, skin temperature and
general somatic activity (GSA). These data were then subject to two analyses. For the
first analysis, a multidimensional scaling (MDS) procedure was used to determine the
dimensionality of the data. This analysis suggested that the physiological similarities
and dissimilarities of the six emotional states fit within a four dimensional model. For
the second analysis, a discriminant function analysis was used to determine the mathematic
functions that would distinguish the six emotional states. This analysis suggested that
functions that distinguish the six states. Moreover, these analyses indicate that these
emotional state. Because of our need to incorporate these measurements into a small, non-
intrusive form, we will explore taking these measurements from the hand. The amount of
conductivity of the skin is best taken from the fingers. However, the other measures may
not be as obvious or robust. We hypothesize that changes in the temperature of the finger
are reliable for prediction of emotion. We also hypothesize the GSA can be measured by
change in movement in the computer mouse. Our efforts to develop a robust pulse meter are